|
[1]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[2]
|
Blakley, G.R. (1979) Safeguarding Cryptographic Keys. International Workshop on Managing Requirements Knowledge, New York, 4-7 June 1979, 313-313. [Google Scholar] [CrossRef]
|
|
[3]
|
Miao, F., Yu, Y., Meng, K., et al. (2021) Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. Security and Com-munication Networks, 2021, Article ID: 6678345. [Google Scholar] [CrossRef]
|
|
[4]
|
Subrahmanyam, R., Rukma Rekha, N. and Subba Rao, Y.V. (2022) Multipartite Verifiable Secret Sharing Based on CRT. In: Smys, S., et al., Eds., Computer Networks and Inventive Communication Technologies, Springer, Singapore, 233-245. [Google Scholar] [CrossRef]
|
|
[5]
|
Shima, K. and Doi, H. (2018) A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques. In: Lee, K., Ed., International Conference on Information Security and Cryptology-ICISC 2018, Springer, Cham, 217-232. [Google Scholar] [CrossRef]
|
|
[6]
|
Tochikubo, K. (2019) General Secret Sharing Schemes Using Hierarchical Threshold Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 102, 1037-1047. [Google Scholar] [CrossRef]
|
|
[7]
|
Ding, J., Lin, C. and Lin, F. (2020) Optimal Threshold Changeable Secret Sharing with New Threshold Change Range. In: Nguyen, K., et al., Eds., International Conference on Provable Security 2020, Springer, Cham, 361-378. [Google Scholar] [CrossRef]
|
|
[8]
|
Harn, L., Hsu, C. and Xia, Z. (2022) A Novel Threshold Changeable Secret Sharing Scheme. Frontiers of Computer Science, 16, Article ID: 161807. [Google Scholar] [CrossRef]
|
|
[9]
|
Farràs, O., Martí-Farré, J. and Padró, C. (2012) Ideal Multipartite Secret Sharing Schemes. Journal of Cryptology, 25, 434-463. [Google Scholar] [CrossRef]
|
|
[10]
|
Simmons, G.J. (1988) How to (Really) Share a Secret. In: Goldwasser, S., Ed., Advances in Cryptology—CRYPTO’88, Springer, Cham, 390-448. [Google Scholar] [CrossRef]
|
|
[11]
|
Brickell, E.F. (1989) Some Ideal Secret Sharing Schemes. In: Quisquater, J.-J. and Vandewalle, J., Eds., Advances in Cryptology—EUROCRYPT ’89, Springer, Cham , 468-475. [Google Scholar] [CrossRef]
|
|
[12]
|
Tassa, T. (2007) Hierarchical Threshold Secret Sharing. Journal of Cryptology, 20, 237-264. [Google Scholar] [CrossRef]
|
|
[13]
|
Hsu, C.F. and Harn, L. (2014) Multipartite Secret Sharing Based on CRT. Wireless Personal Communications, 78, 271-282. [Google Scholar] [CrossRef]
|
|
[14]
|
Harsha, P., Chanakya, P. and Vadlamudi, C.V. (2018) A Reusa-ble Multipartite Secret Sharing Scheme Based on Super Increasing Sequence. International Journal of Network Security, 20, 527-535.
|
|
[15]
|
Chen, Q., Tang, C. and Lin, Z. (2019) Efficient Explicit Constructions of Compartmented Secret Sharing Schemes. Designs, Codes and Cryptography, 87, 2913-2940. [Google Scholar] [CrossRef]
|
|
[16]
|
Chen, Q., Tang, C. and Lin, Z. (2021) Efficient Explicit Con-structions of Multipartite Secret Sharing Schemes. IEEE Transactions on Information Theory, 68, 601-631. [Google Scholar] [CrossRef]
|
|
[17]
|
Xu, G., Yuan, J., Xu, G., et al. (2021) A New Multi-Stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier. Information Technology and Control, 50, 236-246. [Google Scholar] [CrossRef]
|
|
[18]
|
Shannon, C.E. (1948) A Mathematical Theory of Communication. The Bell System Technical Journal, 27, 379-423. [Google Scholar] [CrossRef]
|
|
[19]
|
Cohen, H. (1993) A Course in Computational Algebraic Number Theory. Springer, Berlin. [Google Scholar] [CrossRef]
|
|
[20]
|
丘维声. 抽象代数基础[M]. 第2版. 北京: 高等教育出版社, 2015: 75-81.
|
|
[21]
|
Cavallo, B. and Kahrobaei, D. (2015) Secret Sharing Using Non-Commutative Groups and the Shortlex Order. Contemporary Mathematics, 633, 1-8. [Google Scholar] [CrossRef]
|